· Select a network traffic analysis tool after reviewing the resources in the Case Assignment Overivew. Suggested tools include Microsoft Network Monitor (
http://www.microsoft.com/en-us/download/details.aspx?id=4865
), Capsa Free (
http://www.colasoft.com/capsa-free
), and WireShark (
https://www.wireshark.org/download.html
), although you can select any other tool you feel is worthwhile for the assignment.
· Gather some data from your home network using the selected tool. You may not have a network, but you will still be able to gather data from your computer, the connection to the Internet, and the associated traffic.
· Write a paper summarizing your results that addresses the following:
o Describe the tool you selected and why you selected this tool.
o Describe the data you collected and how it can be used to identify threats to your network.
o Include a summary of the data and screen shots of the tool in use.
o Include a title page.
o Cite all sources and provide a reference list at the end of your paper.
o Paper should be 3-4 double-spaced pages, excluding the title and reference pages.
o The paper will be assessed on your ability to consolidate ideas from your research and your understanding of the materials.
·
Select a network traffic analysis tool after reviewing the resources in the Case Assignment Overivew. Suggested tools include Microsoft Network Monitor (
http://www.microsoft.com/en-us/download/details.aspx?id=4865
), Capsa Free (
http://www.colasoft.com/capsa-free
), and WireShark (
https://www.wireshark.org/download.html
), although you can select any other tool you feel is worthwhile for the assignment.
· Gather some data from your home network using the selected tool. You may not have a network, but you will still be able to gather data from your computer, the connection to the Internet, and the associated traffic.
· Write a paper summarizing your results that addresses the following:
· Describe the tool you selected and why you selected this tool.
· Describe the data you collected and how it can be used to identify threats to your network.
· Include a summary of the data and screen shots of the tool in use.
· Include a title page.
· Cite all sources and provide a reference list at the end of your paper.
· Paper should be 3-4 double-spaced pages, excluding the title and reference pages.
· The paper will be assessed on your ability to consolidate ideas from your research and your understanding of the materials.